SlideShare a Scribd company logo
1 of 33
TheRiseofDeep
Learning
Wenjin Gu, August 2018
Year1 ofDL Era
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited. 2
Whathappened–AlexNet
3
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Winner of ImageNet LSVRC in 2012
◦ Designed by Alex Krizhevsky, Geoffrey Hinton, and Ilya
Sutskever (the SuperVision group,UofT)
◦ Achieved a top-5 error of 15.3% (2nd place - 26.2%)
Whymachinelearning
4
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Conventional programming is logic driven
◦ Human thoughts are limited by number of logical arguments
thus have troubles to handle high dimensional data
◦ NP- hard problems cannot be solved in polynomial time
5
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Machine Learning is data driven and self-fitting thus can
handle high dimensional data
◦ Machine Learning gives approximation of an unknown target
function up to a given accuracy thus can tackle np-hard
problems (Heuristic algorithm)
Why machinelearning
6
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Assuming dogs and cats are distinguishable, there must be a
hyperplane divides them in a high dimensional feature space.
However the space is crumpled and folded in its raw data
representation
What does deep learningdo
How DeepLearningunfoldsthespace
7
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Connections cause linear transformation and feature interaction
◦ More nodes increases feature dimensionality
◦ Less nodes reduces dimensionality (drops irrelevant features)
◦ Activation function unfolds the space by nonlinearity
φ(∑wx+b)
Abriefhistory
8
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Abriefhistory– thetrouble
9
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Feature engineering + classifier > Shallow NN > Deep NN
◦ Believe domain expertise is mandatory
◦ Assumes gradient descent would get trapped in poor local
minima
Localminimum andSaddle Point
10
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Abriefhistory– therealproblem
11
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Vanishing of gradients
In the attempt to normalize data, activation functions are usually in the (0,1)
range. Backpropagation computes gradients by the chain rule. This has the effect of
multiplying n of these small numbers to compute gradients. Error signal eventually
disappears in the front layer, effectively preventing the further training.
Abriefhistory– thebreakthrough
12
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ “A Fast Learning Algorithm for Deep Belief Nets” by Hinton, Geoffrey E., Simon
Osindero, and Yee-Whye Teh. Neural computation 18.7 (2006): 1527-1554
◦ Different from Deep Forward
Network, Deep Belief Network
connections are bi-direction
Abriefhistory– thebreakthrough
13
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Unsupervised learning to train layer by layer in a deep forward network view
◦ Increases the selectivity and the
invariance of the representation
Abriefhistory– newtechniques(RectifiedLinearUnit)
14
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Short cut
Goingdeeperanddeeper
15
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
16
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock - Layers
17
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock - Layers
◦ Dense - fully connected layer often used for simple vector data
◦ LSTM - recurrent layer often used for Sequence data (NLP, stock)
◦ Conv2D - 2D convolution layer often used for image process
◦ MaxPooling2D - 2D pooling layer often used for image process down sizing
18
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock - Lossfunction
19
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock - Lossfunction
◦ Lie at the heart of machine learning. The network will take whatever shortcut it
can, to minimize the loss. Take an example, anything wrong with this objective?
“Maximizing the average well-being of all humans”
◦ Common Loss functions
• Binary_crossentropy for a binary classification,
• Categorical_crossentropy for multi-class classification problem,
• Mean Squared Error for a regression problem.
20
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Input tensorshape
21
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Input tensorshape
◦ Vector data—2D tensors of shape (samples, features)
◦ Timeseries data or sequence data—3D tensors of shape (samples, timesteps,
features)
◦ Images—4D tensors of shape (samples, height, width, channels) or (samples,
channels, height, width)
◦ Video—5D tensors of shape (samples, frames, height, width, channels) or
(samples, frames, channels, height, width)
* Batch dimension (samples) is not included in ‘input_shape’
22
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Activationfunction
23
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Activationfunction
Reason
• Continuously differentiable – required by gradient-based optimization
• Nonlinearity – Map to new hypothesis space. Without nonlinearity,
multi-layer collapse to single layer
Common activation function
• Relu – hidden layer
• Sigmoid – last layer for Binary classification, Multiclass multilabel
classification
• Softmax – last layer for Multiclass single-label classification
24
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Gradient descentoptimizer
25
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Gradient descentoptimizer
◦ Overcome local minima and saddle points (Momentum, Look-ahead)
SGD optimization on saddle point SGD optimization on loss surface contours
26
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Metrics
27
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Buildingblock – Metrics
◦ Question 1: why we need metrics since there is already a loss function?
 Loss function is for machine, metrics is for human
◦ Question 2: Can we use metrics as a loss function?
 Loss function needs to be continuous and differentiable in order for gradient
descent to work
◦ Question 3: Do we need any metrics other than ‘accuracy’?
 Email spam detection – false positive is expensive, false negative is probably ok
 Airport terrorist detection – false negative is fatal, false positive is less expensive
DoesDeepLearningsurpasshumanalready?
28
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Image Recognition – 2015 Microsoft, Google Beat Humans at Image Recognition
Really? try this one -
Tagging image is simple, but to tell a story
from a image requires knowledges outside of
the picture. Same goes with Natural language
understanding
DoesDeepLearningsurpasshumanalready?
29
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Game – 2016 AlphaGo beats Lee Sedol in a five-game match
◦ 2018 August Dota 2 Pro players beats OpenAI (founded by
Elon Musk) bot in a best of three game match
MOBA games take place in complex, ever-changing environment, which is closer to the problems we
want AI to tackle in real life. To make the life easer for the machine, 18 of more than 100 heroes are
allowed to be used in the game.
DoesDeepLearningsurpasshumanalready?
30
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Deep learning in different fields are unbalanced. While it exceeds human
level in fields with clear rules and sufficient training data, it lags behind in
area requires external knowledge or with more uncertainties.
The Real World Is Far More Complicated than a board game and human
learn things much fast and efficiently with fewer examples.
Nextstep
31
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
◦ Short term – blend deep learning and machine learning with
human knowledge
◦ Long term – Unsupervised learning, multi-task multi-stage
learning to create real AI
Questions?
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited. 32
Copyright ©2017 Genesys.
2001 Junipero Serra Blvd., Daly City, CA 94014
All Rights reserved. Genesys and the Genesys logo are registered trademarks of Genesys. All other company names and logos may be registered
trademarks or trademarks of their respective companies.
Thank You
Visit www.genesys.com or call +1.855.821.0932 for more information
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.

More Related Content

Similar to Raise of deep learning

Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)
Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)
Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)Verhaert Masters in Innovation
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...Edge AI and Vision Alliance
 
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人台灣資料科學年會
 
Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Neo4j
 
LST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, TouchLST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, TouchDimitry Snezhkov
 
On the Design Dilemma in Dining Cryptographer Networks
On the Design Dilemma in Dining Cryptographer NetworksOn the Design Dilemma in Dining Cryptographer Networks
On the Design Dilemma in Dining Cryptographer NetworksJens Oberender
 
Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...LeMeniz Infotech
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
Introduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionIntroduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionDarian Frajberg
 
Deep learning introduction
Deep learning introductionDeep learning introduction
Deep learning introductiongiangbui0816
 
Machine Learning - Challenges, Learnings & Opportunities
Machine Learning - Challenges, Learnings & OpportunitiesMachine Learning - Challenges, Learnings & Opportunities
Machine Learning - Challenges, Learnings & OpportunitiesCodePolitan
 
TensorFlow London: Cutting edge generative models
TensorFlow London: Cutting edge generative modelsTensorFlow London: Cutting edge generative models
TensorFlow London: Cutting edge generative modelsSeldon
 
Fingerprint compression based on sparse representation
Fingerprint compression based on sparse representationFingerprint compression based on sparse representation
Fingerprint compression based on sparse representationLeMeniz Infotech
 
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013Gigaom
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Venkata Reddy Konasani
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 

Similar to Raise of deep learning (20)

Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)
Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)
Use Artificial Intelligence to make smart decisions (by Pieter Zuliani)
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
 
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
 
Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...Are You Underestimating the Value Within Your Data? A conversation about grap...
Are You Underestimating the Value Within Your Data? A conversation about grap...
 
LST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, TouchLST Toolkit: Exfiltration Over Sound, Light, Touch
LST Toolkit: Exfiltration Over Sound, Light, Touch
 
On the Design Dilemma in Dining Cryptographer Networks
On the Design Dilemma in Dining Cryptographer NetworksOn the Design Dilemma in Dining Cryptographer Networks
On the Design Dilemma in Dining Cryptographer Networks
 
Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
Fuzzy expert systems
Fuzzy expert systemsFuzzy expert systems
Fuzzy expert systems
 
Introduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolutionIntroduction to the Artificial Intelligence and Computer Vision revolution
Introduction to the Artificial Intelligence and Computer Vision revolution
 
Null
NullNull
Null
 
Deep learning introduction
Deep learning introductionDeep learning introduction
Deep learning introduction
 
Deep learning
Deep learningDeep learning
Deep learning
 
Machine Learning - Challenges, Learnings & Opportunities
Machine Learning - Challenges, Learnings & OpportunitiesMachine Learning - Challenges, Learnings & Opportunities
Machine Learning - Challenges, Learnings & Opportunities
 
TensorFlow London: Cutting edge generative models
TensorFlow London: Cutting edge generative modelsTensorFlow London: Cutting edge generative models
TensorFlow London: Cutting edge generative models
 
Fingerprint compression based on sparse representation
Fingerprint compression based on sparse representationFingerprint compression based on sparse representation
Fingerprint compression based on sparse representation
 
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013
THE CIA’S “GRAND CHALLENGES” WITH BIG DATA from Structure:Data 2013
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 

Recently uploaded

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Raise of deep learning

  • 2. Year1 ofDL Era Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. 2
  • 3. Whathappened–AlexNet 3 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Winner of ImageNet LSVRC in 2012 ◦ Designed by Alex Krizhevsky, Geoffrey Hinton, and Ilya Sutskever (the SuperVision group,UofT) ◦ Achieved a top-5 error of 15.3% (2nd place - 26.2%)
  • 4. Whymachinelearning 4 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Conventional programming is logic driven ◦ Human thoughts are limited by number of logical arguments thus have troubles to handle high dimensional data ◦ NP- hard problems cannot be solved in polynomial time
  • 5. 5 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Machine Learning is data driven and self-fitting thus can handle high dimensional data ◦ Machine Learning gives approximation of an unknown target function up to a given accuracy thus can tackle np-hard problems (Heuristic algorithm) Why machinelearning
  • 6. 6 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Assuming dogs and cats are distinguishable, there must be a hyperplane divides them in a high dimensional feature space. However the space is crumpled and folded in its raw data representation What does deep learningdo
  • 7. How DeepLearningunfoldsthespace 7 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Connections cause linear transformation and feature interaction ◦ More nodes increases feature dimensionality ◦ Less nodes reduces dimensionality (drops irrelevant features) ◦ Activation function unfolds the space by nonlinearity φ(∑wx+b)
  • 8. Abriefhistory 8 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 9. Abriefhistory– thetrouble 9 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Feature engineering + classifier > Shallow NN > Deep NN ◦ Believe domain expertise is mandatory ◦ Assumes gradient descent would get trapped in poor local minima
  • 10. Localminimum andSaddle Point 10 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 11. Abriefhistory– therealproblem 11 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Vanishing of gradients In the attempt to normalize data, activation functions are usually in the (0,1) range. Backpropagation computes gradients by the chain rule. This has the effect of multiplying n of these small numbers to compute gradients. Error signal eventually disappears in the front layer, effectively preventing the further training.
  • 12. Abriefhistory– thebreakthrough 12 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ “A Fast Learning Algorithm for Deep Belief Nets” by Hinton, Geoffrey E., Simon Osindero, and Yee-Whye Teh. Neural computation 18.7 (2006): 1527-1554 ◦ Different from Deep Forward Network, Deep Belief Network connections are bi-direction
  • 13. Abriefhistory– thebreakthrough 13 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Unsupervised learning to train layer by layer in a deep forward network view ◦ Increases the selectivity and the invariance of the representation
  • 14. Abriefhistory– newtechniques(RectifiedLinearUnit) 14 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Short cut
  • 15. Goingdeeperanddeeper 15 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 16. 16 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock - Layers
  • 17. 17 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock - Layers ◦ Dense - fully connected layer often used for simple vector data ◦ LSTM - recurrent layer often used for Sequence data (NLP, stock) ◦ Conv2D - 2D convolution layer often used for image process ◦ MaxPooling2D - 2D pooling layer often used for image process down sizing
  • 18. 18 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock - Lossfunction
  • 19. 19 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock - Lossfunction ◦ Lie at the heart of machine learning. The network will take whatever shortcut it can, to minimize the loss. Take an example, anything wrong with this objective? “Maximizing the average well-being of all humans” ◦ Common Loss functions • Binary_crossentropy for a binary classification, • Categorical_crossentropy for multi-class classification problem, • Mean Squared Error for a regression problem.
  • 20. 20 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Input tensorshape
  • 21. 21 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Input tensorshape ◦ Vector data—2D tensors of shape (samples, features) ◦ Timeseries data or sequence data—3D tensors of shape (samples, timesteps, features) ◦ Images—4D tensors of shape (samples, height, width, channels) or (samples, channels, height, width) ◦ Video—5D tensors of shape (samples, frames, height, width, channels) or (samples, frames, channels, height, width) * Batch dimension (samples) is not included in ‘input_shape’
  • 22. 22 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Activationfunction
  • 23. 23 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Activationfunction Reason • Continuously differentiable – required by gradient-based optimization • Nonlinearity – Map to new hypothesis space. Without nonlinearity, multi-layer collapse to single layer Common activation function • Relu – hidden layer • Sigmoid – last layer for Binary classification, Multiclass multilabel classification • Softmax – last layer for Multiclass single-label classification
  • 24. 24 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Gradient descentoptimizer
  • 25. 25 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Gradient descentoptimizer ◦ Overcome local minima and saddle points (Momentum, Look-ahead) SGD optimization on saddle point SGD optimization on loss surface contours
  • 26. 26 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Metrics
  • 27. 27 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Buildingblock – Metrics ◦ Question 1: why we need metrics since there is already a loss function?  Loss function is for machine, metrics is for human ◦ Question 2: Can we use metrics as a loss function?  Loss function needs to be continuous and differentiable in order for gradient descent to work ◦ Question 3: Do we need any metrics other than ‘accuracy’?  Email spam detection – false positive is expensive, false negative is probably ok  Airport terrorist detection – false negative is fatal, false positive is less expensive
  • 28. DoesDeepLearningsurpasshumanalready? 28 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Image Recognition – 2015 Microsoft, Google Beat Humans at Image Recognition Really? try this one - Tagging image is simple, but to tell a story from a image requires knowledges outside of the picture. Same goes with Natural language understanding
  • 29. DoesDeepLearningsurpasshumanalready? 29 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Game – 2016 AlphaGo beats Lee Sedol in a five-game match ◦ 2018 August Dota 2 Pro players beats OpenAI (founded by Elon Musk) bot in a best of three game match MOBA games take place in complex, ever-changing environment, which is closer to the problems we want AI to tackle in real life. To make the life easer for the machine, 18 of more than 100 heroes are allowed to be used in the game.
  • 30. DoesDeepLearningsurpasshumanalready? 30 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Deep learning in different fields are unbalanced. While it exceeds human level in fields with clear rules and sufficient training data, it lags behind in area requires external knowledge or with more uncertainties. The Real World Is Far More Complicated than a board game and human learn things much fast and efficiently with fewer examples.
  • 31. Nextstep 31 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. ◦ Short term – blend deep learning and machine learning with human knowledge ◦ Long term – Unsupervised learning, multi-task multi-stage learning to create real AI
  • 32. Questions? Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. 32
  • 33. Copyright ©2017 Genesys. 2001 Junipero Serra Blvd., Daly City, CA 94014 All Rights reserved. Genesys and the Genesys logo are registered trademarks of Genesys. All other company names and logos may be registered trademarks or trademarks of their respective companies. Thank You Visit www.genesys.com or call +1.855.821.0932 for more information Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.